<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic RE: 802.1X supplicant on access switches for uplink authentication (for security &amp; automation) in Hero Product Suggestions</title>
    <link>https://community.extremenetworks.com/t5/hero-product-suggestions/802-1x-supplicant-on-access-switches-for-uplink-authentication/m-p/58572#M65</link>
    <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;since this feature is missing we have just failed to replace 140 HP switches with XOS switches. HP (now Aruba) has supported this feature for years.&lt;/P&gt;&lt;P&gt;Specifically, this is a project where Fiber to the Desk is in use and therefore there is a switch in every office. To prevent an employee from being on the network after unplugging the switch, authentication must also be performed on the uplink, not just on the access.&lt;/P&gt;&lt;P&gt;Here a screenshot from the HP manual&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;FIGURE&gt;&lt;span class="lia-inline-image-display-wrapper" image-alt="4b7ec467542c48a7aee40c64c53a0fbf_0e4e19b0-6cf6-4717-9be4-c3e019bd4c72.png"&gt;&lt;img src="https://community.extremenetworks.com/t5/image/serverpage/image-id/2555i6C558A7BC9AF6FE4/image-size/large?v=v2&amp;amp;px=999" role="button" title="4b7ec467542c48a7aee40c64c53a0fbf_0e4e19b0-6cf6-4717-9be4-c3e019bd4c72.png" alt="4b7ec467542c48a7aee40c64c53a0fbf_0e4e19b0-6cf6-4717-9be4-c3e019bd4c72.png" /&gt;&lt;/span&gt;&lt;/FIGURE&gt;&lt;P&gt;And NO&amp;nbsp;VSP is no option here in the moment for the customer.&lt;/P&gt;</description>
    <pubDate>Thu, 21 Jan 2021 23:50:00 GMT</pubDate>
    <dc:creator>StephanH</dc:creator>
    <dc:date>2021-01-21T23:50:00Z</dc:date>
    <item>
      <title>802.1X supplicant on access switches for uplink authentication (for security &amp; automation)</title>
      <link>https://community.extremenetworks.com/t5/hero-product-suggestions/802-1x-supplicant-on-access-switches-for-uplink-authentication/m-p/58562#M55</link>
      <description>&lt;P&gt;APs are mostly authenticated at a switchport to use an automatic configuration of switchport behaviours (VLANs, port authentication, ..) like I mentioned in my “AP-Aware” idea. We need this function as well for authentication and automation to&amp;nbsp;connect access switches to&amp;nbsp;core/distribution/fabric switches. This ist for security reasons&amp;nbsp; in case of using distributed switches in office, production, IOT/OT, …&amp;nbsp;to prevent unauthorized usage uf the uplink ports as well as a basic function to use automation in a distributed environment.&lt;/P&gt;&lt;P&gt;This is not new to use a 802.1X supplicant on access devices (like APs) to connect to switchports and use automation for on-/offboarding.&amp;nbsp;&lt;/P&gt;&lt;P&gt;More and more small devices in production, healthcare, education environments for headless devices, IOT/OT force us to deliver an easy to deploy and use environment.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;br&lt;/P&gt;&lt;P&gt;Volker&lt;/P&gt;</description>
      <pubDate>Wed, 11 Nov 2020 18:58:00 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/hero-product-suggestions/802-1x-supplicant-on-access-switches-for-uplink-authentication/m-p/58562#M55</guid>
      <dc:creator>Volker_Kull</dc:creator>
      <dc:date>2020-11-11T18:58:00Z</dc:date>
    </item>
    <item>
      <title>RE: 802.1X supplicant on access switches for uplink authentication (for security &amp; automation)</title>
      <link>https://community.extremenetworks.com/t5/hero-product-suggestions/802-1x-supplicant-on-access-switches-for-uplink-authentication/m-p/58563#M56</link>
      <description>&lt;P&gt;In fabric environment is’t already the case. With auto-sense feature added in 8.3 for Zero Touch Fabric, it will cater for similar scenario.&lt;/P&gt;&lt;P&gt;Mechanism there will not be 802.1x specific, however from security perspective you can use:&lt;/P&gt;&lt;OL type="1"&gt;&lt;LI&gt;ISIS HMAC&lt;/LI&gt;	&lt;LI&gt;Fabric Attach authentication&lt;/LI&gt;	&lt;LI&gt;MACSEC keys&amp;nbsp;&lt;/LI&gt;&lt;/OL&gt;</description>
      <pubDate>Fri, 04 Dec 2020 23:02:00 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/hero-product-suggestions/802-1x-supplicant-on-access-switches-for-uplink-authentication/m-p/58563#M56</guid>
      <dc:creator>AlexN</dc:creator>
      <dc:date>2020-12-04T23:02:00Z</dc:date>
    </item>
    <item>
      <title>RE: 802.1X supplicant on access switches for uplink authentication (for security &amp; automation)</title>
      <link>https://community.extremenetworks.com/t5/hero-product-suggestions/802-1x-supplicant-on-access-switches-for-uplink-authentication/m-p/58564#M57</link>
      <description>&lt;P&gt;Hello AlexN!&lt;/P&gt;&lt;P&gt;Fabric is not everywhere and cloud as well.&lt;/P&gt;&lt;P&gt;In our customer base 99% of access switches are EXOS, and more than 50% of the distribution/core switches are EXOS as well.&lt;/P&gt;&lt;P&gt;Volker&lt;/P&gt;</description>
      <pubDate>Fri, 04 Dec 2020 23:10:00 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/hero-product-suggestions/802-1x-supplicant-on-access-switches-for-uplink-authentication/m-p/58564#M57</guid>
      <dc:creator>Volker_Kull</dc:creator>
      <dc:date>2020-12-04T23:10:00Z</dc:date>
    </item>
    <item>
      <title>RE: 802.1X supplicant on access switches for uplink authentication (for security &amp; automation)</title>
      <link>https://community.extremenetworks.com/t5/hero-product-suggestions/802-1x-supplicant-on-access-switches-for-uplink-authentication/m-p/58565#M58</link>
      <description>&lt;P&gt;That means there are substantial benefits to introduce them to Fabric, right ? &lt;span class="lia-inline-image-display-wrapper" image-alt="51caffaffb1a47acab69404fa75e3241_1f609.png"&gt;&lt;img src="https://community.extremenetworks.com/t5/image/serverpage/image-id/2631iEDCF5519B0BAAAC8/image-size/large?v=v2&amp;amp;px=999" role="button" title="51caffaffb1a47acab69404fa75e3241_1f609.png" alt="51caffaffb1a47acab69404fa75e3241_1f609.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;In legacy networking scenarios achieving same automation levels can be more challenging however not impossible: &amp;nbsp;for instance combination of ZTP+ and OSPF/BGP authentication would do similar trick with EXOS.&lt;/P&gt;&lt;P&gt;So is your request limited to only EXOS then ? &amp;nbsp;&lt;/P&gt;&lt;P&gt;BR,&lt;/P&gt;&lt;P&gt;Alex&lt;/P&gt;</description>
      <pubDate>Sat, 05 Dec 2020 00:41:00 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/hero-product-suggestions/802-1x-supplicant-on-access-switches-for-uplink-authentication/m-p/58565#M58</guid>
      <dc:creator>AlexN</dc:creator>
      <dc:date>2020-12-05T00:41:00Z</dc:date>
    </item>
    <item>
      <title>RE: 802.1X supplicant on access switches for uplink authentication (for security &amp; automation)</title>
      <link>https://community.extremenetworks.com/t5/hero-product-suggestions/802-1x-supplicant-on-access-switches-for-uplink-authentication/m-p/58566#M59</link>
      <description>&lt;P&gt;We are working on getting fabric into the field as much as possible. But sometimes the field of application is very static and two completely contrary OS completely overwhelm the customer.&lt;BR /&gt;We want a continuous functional parity over the whole product portfolio, therefore this is not only limited to EXOS.&lt;BR /&gt;All switches or APs (AH, WING7) should be combinable with all switches and should be connected and the environment should be configured automatically. This should be uniformly configurable from the XMC/XIQ.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Volker&lt;/P&gt;</description>
      <pubDate>Sat, 05 Dec 2020 01:05:00 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/hero-product-suggestions/802-1x-supplicant-on-access-switches-for-uplink-authentication/m-p/58566#M59</guid>
      <dc:creator>Volker_Kull</dc:creator>
      <dc:date>2020-12-05T01:05:00Z</dc:date>
    </item>
    <item>
      <title>RE: 802.1X supplicant on access switches for uplink authentication (for security &amp; automation)</title>
      <link>https://community.extremenetworks.com/t5/hero-product-suggestions/802-1x-supplicant-on-access-switches-for-uplink-authentication/m-p/58567#M60</link>
      <description>&lt;P&gt;Volker, we agree with that statement, the thought is to bring those auto-sense concepts also to EXOS (no committment yet). Would you think most of those deployments use some sort of NAC, or are you looking for a solution without NAC in place?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Roger&lt;/P&gt;</description>
      <pubDate>Thu, 10 Dec 2020 23:25:00 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/hero-product-suggestions/802-1x-supplicant-on-access-switches-for-uplink-authentication/m-p/58567#M60</guid>
      <dc:creator>Roger_Lapuh</dc:creator>
      <dc:date>2020-12-10T23:25:00Z</dc:date>
    </item>
    <item>
      <title>RE: 802.1X supplicant on access switches for uplink authentication (for security &amp; automation)</title>
      <link>https://community.extremenetworks.com/t5/hero-product-suggestions/802-1x-supplicant-on-access-switches-for-uplink-authentication/m-p/58568#M61</link>
      <description>&lt;P&gt;Roger,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;we need both. Using standards (802.1X) this would not be a problem.&lt;/P&gt;&lt;P&gt;With NAC, we have nearly all features we need.&lt;/P&gt;&lt;P&gt;Without NAC it´s a thing on the switch. With UPM we have good tools on EXOS. VSP ? nothing I know…&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Issues: Deployment of UPM scripts from&amp;nbsp;XIQ is a switch by switch operation via manual SSH setup per switch (You will not do this for &amp;gt;50 switches). Deployment of python scrips is not possible because it´s a separate file&amp;nbsp;and not supported with XiQ. XMC could do everything of that and much more ..&lt;/P&gt;&lt;P&gt;But remember it´s not only about authentication! As I mentioned in the AP-Aware feature it is more to prepare a Port for uplink use and back to start after disconnecting the uplink. It`s not quite easy and we need&amp;nbsp;to change the view and focus and end-to-end approach and not getting stuck in an endless per feature discussion. Think in use cases...and what customer will love to be and stay at Extreme...&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;br&lt;/P&gt;&lt;P&gt;Volker&lt;/P&gt;</description>
      <pubDate>Sat, 12 Dec 2020 04:09:00 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/hero-product-suggestions/802-1x-supplicant-on-access-switches-for-uplink-authentication/m-p/58568#M61</guid>
      <dc:creator>Volker_Kull</dc:creator>
      <dc:date>2020-12-12T04:09:00Z</dc:date>
    </item>
    <item>
      <title>RE: 802.1X supplicant on access switches for uplink authentication (for security &amp; automation)</title>
      <link>https://community.extremenetworks.com/t5/hero-product-suggestions/802-1x-supplicant-on-access-switches-for-uplink-authentication/m-p/58569#M62</link>
      <description>&lt;P&gt;VOSS 8.3 will introduce Auto-Sense Port capabilities. A switch that is booted from default will have all ports automatically auto-sense enabled&amp;nbsp;(or one can turn on auto-sense manually).&lt;/P&gt;&lt;P&gt;On an Auto-Sense port APs that are Fabric Attach (FA) capable (FA is also coming to AH APs)will be automatically authenticated through FA and will automatically put into an onboarding ISID, such that the AP can reach its management infrastructure. At that point FA will be used to signal SSID to VLAN/ISID mappings.&lt;/P&gt;&lt;P&gt;This is all without any NAC in place.&amp;nbsp;&lt;/P&gt;&lt;P&gt;What I described here is supported for any FA capable device and similarly works for IP Phones.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Auto-sense is expandable, if we see additional value add that we could be providing, we certainly be open to look into it.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Roger&lt;/P&gt;</description>
      <pubDate>Mon, 14 Dec 2020 16:52:00 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/hero-product-suggestions/802-1x-supplicant-on-access-switches-for-uplink-authentication/m-p/58569#M62</guid>
      <dc:creator>Roger_Lapuh</dc:creator>
      <dc:date>2020-12-14T16:52:00Z</dc:date>
    </item>
    <item>
      <title>RE: 802.1X supplicant on access switches for uplink authentication (for security &amp; automation)</title>
      <link>https://community.extremenetworks.com/t5/hero-product-suggestions/802-1x-supplicant-on-access-switches-for-uplink-authentication/m-p/58570#M63</link>
      <description>&lt;P&gt;Roger,&lt;/P&gt;&lt;P&gt;this is all about single features. We need to have an end-to-end solution no matter what features will be used. The customer want to&amp;nbsp;connect&amp;nbsp;a switch, AP, server, what ever to an uplink and requires a complete on- and offboarding process: Port, LAG, VLANs, Authentication, ACL, QoS, ….&lt;/P&gt;&lt;P&gt;On- and offboarding means not only to provide a valid port configuration via script or workflow, it means a reconfiguration of the port after disconnect in default state.&lt;/P&gt;&lt;P&gt;FA is a feature for &amp;nbsp;limited products supporting FA. It´s a possibility but what to do without FA on the uplink?&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 15 Dec 2020 00:16:00 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/hero-product-suggestions/802-1x-supplicant-on-access-switches-for-uplink-authentication/m-p/58570#M63</guid>
      <dc:creator>Volker_Kull</dc:creator>
      <dc:date>2020-12-15T00:16:00Z</dc:date>
    </item>
    <item>
      <title>RE: 802.1X supplicant on access switches for uplink authentication (for security &amp; automation)</title>
      <link>https://community.extremenetworks.com/t5/hero-product-suggestions/802-1x-supplicant-on-access-switches-for-uplink-authentication/m-p/58571#M64</link>
      <description>&lt;P&gt;Volker, auto-sense does exactly that:&amp;nbsp;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;It turns a port into an NNI when another VSP is connected&lt;/LI&gt;	&lt;LI&gt;it tuns a port into an FA links if an FA device is connected&lt;/LI&gt;	&lt;LI&gt;it turns a port into an IP Phone port if an IP phone is detected through LLDP-MED&lt;/LI&gt;	&lt;LI&gt;it turns a port into a UNI port if non of the above is detected	&lt;UL&gt;&lt;LI&gt;as a UNI it can be run without NAC, then all devices end up in the secure guest/onboarding PVLAN 4048, ISID 15999999&lt;/LI&gt;		&lt;LI&gt;as a UNI with NAC devices can be assigned into their own VLAN/ISID through Radius with MHMV per host (MAC).&lt;/LI&gt;	&lt;/UL&gt;&lt;/LI&gt;	&lt;LI&gt;if any of the above devices are removed, then the port turns into default state.&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;Roger&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 22 Dec 2020 22:55:00 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/hero-product-suggestions/802-1x-supplicant-on-access-switches-for-uplink-authentication/m-p/58571#M64</guid>
      <dc:creator>Roger_Lapuh</dc:creator>
      <dc:date>2020-12-22T22:55:00Z</dc:date>
    </item>
    <item>
      <title>RE: 802.1X supplicant on access switches for uplink authentication (for security &amp; automation)</title>
      <link>https://community.extremenetworks.com/t5/hero-product-suggestions/802-1x-supplicant-on-access-switches-for-uplink-authentication/m-p/58572#M65</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;since this feature is missing we have just failed to replace 140 HP switches with XOS switches. HP (now Aruba) has supported this feature for years.&lt;/P&gt;&lt;P&gt;Specifically, this is a project where Fiber to the Desk is in use and therefore there is a switch in every office. To prevent an employee from being on the network after unplugging the switch, authentication must also be performed on the uplink, not just on the access.&lt;/P&gt;&lt;P&gt;Here a screenshot from the HP manual&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;FIGURE&gt;&lt;span class="lia-inline-image-display-wrapper" image-alt="4b7ec467542c48a7aee40c64c53a0fbf_0e4e19b0-6cf6-4717-9be4-c3e019bd4c72.png"&gt;&lt;img src="https://community.extremenetworks.com/t5/image/serverpage/image-id/2555i6C558A7BC9AF6FE4/image-size/large?v=v2&amp;amp;px=999" role="button" title="4b7ec467542c48a7aee40c64c53a0fbf_0e4e19b0-6cf6-4717-9be4-c3e019bd4c72.png" alt="4b7ec467542c48a7aee40c64c53a0fbf_0e4e19b0-6cf6-4717-9be4-c3e019bd4c72.png" /&gt;&lt;/span&gt;&lt;/FIGURE&gt;&lt;P&gt;And NO&amp;nbsp;VSP is no option here in the moment for the customer.&lt;/P&gt;</description>
      <pubDate>Thu, 21 Jan 2021 23:50:00 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/hero-product-suggestions/802-1x-supplicant-on-access-switches-for-uplink-authentication/m-p/58572#M65</guid>
      <dc:creator>StephanH</dc:creator>
      <dc:date>2021-01-21T23:50:00Z</dc:date>
    </item>
    <item>
      <title>RE: 802.1X supplicant on access switches for uplink authentication (for security &amp; automation)</title>
      <link>https://community.extremenetworks.com/t5/hero-product-suggestions/802-1x-supplicant-on-access-switches-for-uplink-authentication/m-p/58573#M66</link>
      <description>&lt;P&gt;Gents,&lt;BR /&gt;&lt;BR /&gt;let’s look forward into the future, not back into the past. HP does it because they have nothing else to do, they missed entire fabric play and BTW&amp;nbsp;now are trying to chase it.&lt;BR /&gt;&lt;BR /&gt;Choosing between implementing 802.1x supplicant and Auto-Sensing feature I'd better have latter.&lt;BR /&gt;&lt;BR /&gt;In the picture from HP manual - what is real world use case? Switch A in uncontrolled environment, where anyone can plug/unplug uplink, and concern is that malicious user can gain access to uplink traffic ? But 802.1x doesn’t solve it. Perhaps HP/Aruba lied to customer about it, but in reality I just need little hub between SwA and SwB - and here you go, I have access to all traffic !&lt;BR /&gt;What we can do on EXOS to have similar level of protection - LLDP. configure custom LLDP data, and use UPM port to block port unless you see proper string in LLDP.&lt;BR /&gt;But it’s a kludge of course, you should use MACSEC if customer is really concerned about security.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 19 Mar 2021 23:06:00 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/hero-product-suggestions/802-1x-supplicant-on-access-switches-for-uplink-authentication/m-p/58573#M66</guid>
      <dc:creator>AlexN</dc:creator>
      <dc:date>2021-03-19T23:06:00Z</dc:date>
    </item>
    <item>
      <title>RE: 802.1X supplicant on access switches for uplink authentication (for security &amp; automation)</title>
      <link>https://community.extremenetworks.com/t5/hero-product-suggestions/802-1x-supplicant-on-access-switches-for-uplink-authentication/m-p/58574#M67</link>
      <description>&lt;P&gt;Better to use MacSec&lt;/P&gt;</description>
      <pubDate>Tue, 23 Mar 2021 19:41:00 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/hero-product-suggestions/802-1x-supplicant-on-access-switches-for-uplink-authentication/m-p/58574#M67</guid>
      <dc:creator>mitchjreyes</dc:creator>
      <dc:date>2021-03-23T19:41:00Z</dc:date>
    </item>
  </channel>
</rss>

